BlackFog Logo

Cybersecurity 101

A B C D E F G H I K L M N O P Q R S T U V W Z

Cryptography

Cryptography is the science and practice of securing communication and data through the use of mathematical algorithms and protocols. Its primary goal is to protect information from unauthorized access, ensuring confidentiality, integrity, authentication, and non-repudiation in digital communications and transactions. Cryptography has a long history, dating back thousands of years, but in the modern [...]

2024-11-08T12:30:39+00:00March 7th, 2023|

Cryptojacking

Cryptojacking is a type of cybercrime that involves a hacker co-opting a victim’s computing power to generate cryptocurrency on the attacker’s behalf. The motive for these types of attacks is profit, which is usually extremely effective as it is completely hidden from users and difficult to detect. Hackers use this method instead of having [...]

2024-11-08T12:31:25+00:00September 21st, 2022|

Cyber incident

A cyber incident is a cybersecurity event that has compromised an organization's data or systems or that has bypassed the security measures put in place.

2023-03-08T15:36:36+00:00March 8th, 2023|

Cyberattack

A cyberattack is any attempt by cybercriminals to access a computer, computing system or computing network with the intent to steal, expose, alter, disable or destroy information.

2023-03-08T14:05:02+00:00March 8th, 2023|

Cyberespionage

Cyberespionage (preferred) or cyber espionage refers to malicious software used to extract trade secrets or sensitive confidential information from corporations or government for harm (financial, strategic, political) or profit.

2024-11-08T12:52:24+00:00July 19th, 2022|

Cybersecurity

Cybersecurity is the practise of protecting critical systems and sensitive information from cyberattacks through the application of technologies, processes and controls.

2023-03-08T15:38:26+00:00March 8th, 2023|

Cyberwarfare

Cyberwarfare refers to the use of digital attacks, typically by nation-states or state-sponsored groups, to disrupt, damage, or destroy critical infrastructure, steal sensitive information, or influence political or military outcomes. Unlike traditional warfare, which typically involves physical conflict between armed forces, cyberwarfare involves the use of computer networks and digital tools to engage in [...]

2024-11-08T13:22:56+00:00July 6th, 2023|

Data Breach

A security incident during which confidential data or sensitive information is stolen or taken from a system, without the knowledge or authorization of the system’s owners, by either malicious insiders or external attackers.

2023-03-08T14:02:40+00:00March 8th, 2023|

Data Exfiltration

Data exfiltration, data loss or data leakage is essentially the removal of information or data from an electronic device, typically a computer, mobile phone or other Internet connected device.

2022-09-23T21:51:38+01:00July 19th, 2022|

Data Integrity

Data integrity refers to the accuracy, completeness, consistency and validity of data over its lifecycle. In the context of cybersecurity, data integrity is crucial for ensuring that data remains unaltered, uncorrupted, and trustworthy, whether it is being processed by software applications, transmitted over a network, or stored in a database. Without data integrity, organizations [...]

2024-11-08T14:10:03+00:00July 6th, 2023|